In applications of fully-homomorphic encryption (FHE) that involve computation on encryptions produced by several users, it is important that each user proves that her input is indeed well-formed. This may simply mean that the inputs are valid FHE ciphertexts or, more generally, that the plaintexts m additionally satisfy f(m) = 1 for some public function f. The most efficient FHE schemes are based on the hardness of the Ring-LWE problem and so a natural solution would be to use lattice-based zero-knowledge proofs for proving properties about the ciphertext. Such methods, however, require larger-than-necessary parameters and result in rather long proofs, especially when proving general relationships. In this paper, we show that one can get ...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and pe...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m...
Since Gentry's breakthrough construction of fully homomorphic encryption from lattice-based assumpti...
Fully homomorphic encryption (FHE) is a class of encryption algorithms that support any computation ...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years h...
Zero-knowledge proofs of knowledge and fully-homomorphic encryption are two areas that have seen con...
Fully Homomorphic Encryption (FHE) is a prevalent cryptographic primitive that allows for computatio...
We present high performance non-deterministic fully-homomorphic methods for practical randomization ...
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE...
Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat hom...
We propose a new zero-knowledge protocol for proving knowledge of short preimages under additively h...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and pe...
International audienceLattice problems are an attractive basis for cryptographic systems because the...
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of a message, m...
Since Gentry's breakthrough construction of fully homomorphic encryption from lattice-based assumpti...
Fully homomorphic encryption (FHE) is a class of encryption algorithms that support any computation ...
Abstract. Lattice problems are an attractive basis for cryptographic systems be-cause they seem to o...
Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, the last few years h...
Zero-knowledge proofs of knowledge and fully-homomorphic encryption are two areas that have seen con...
Fully Homomorphic Encryption (FHE) is a prevalent cryptographic primitive that allows for computatio...
We present high performance non-deterministic fully-homomorphic methods for practical randomization ...
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE...
Basing on Learning with errors over rings (RLWE) assumption, we provide a new multi-bit somewhat hom...
We propose a new zero-knowledge protocol for proving knowledge of short preimages under additively h...
We define and construct Deniable Fully Homomorphic Encryption based on the Learning With Errors (LW...
In a homomorphic signature scheme, a user Alice signs some large data x using her secret signing key...
Fully homomorphic encryption is an encryption scheme where a party can receive encrypted data and pe...